
Sign up to save your podcasts
Or


In this episode, Maciej Lelusz talks about safety in the sense of leaving your comfort zone. That is the basis of the conversation with Ahmad Halabi, a former hacker who managed to become one of the leading US DoD hackers within 5 months! Currently, as the head of the thriving Resecurity company, he explains how he uses his past skills for protection and security. Hacking is not about computers, and soft - that's a mindset about finding hidden things that are repetitive (repetitions). Ahmad succeeded within 4-5 months of being a top US DoD hacker because of his automation process. Then he shaped into start-up that is focused on vulnerability assessment penetration. And remember that all is not about the darknet it's about the internet!
馃 Partner of the episode: Veeam AWS Backup and Recovery - 10 instances for free for listeners: https://vee.am/evoila
(00:01:04) From hacker to the security protector: what's a secret soft, is that automation?
(00:08:16 How can we apply the knowledge and skills taken from hackers to companies as a protection basis?
(00:14:26) Botnet: a cloud of infected computers or sth else?
(00:16:33) For whom such hacker-like services are? The banking sector, governments, big enterprises, and who else?
(00:21:28) Tools used by hackers to target and protect as well
(00:30:42) vCISO (virtual CISO) - is it a good approach to have such a team on the company's board?
00:35:07 Main idea of smart hacker and security guy: look outside your purpose!
馃敂 Subscribe channel: https://bit.ly/sub_evoilutioncast
By Maciej LeluszIn this episode, Maciej Lelusz talks about safety in the sense of leaving your comfort zone. That is the basis of the conversation with Ahmad Halabi, a former hacker who managed to become one of the leading US DoD hackers within 5 months! Currently, as the head of the thriving Resecurity company, he explains how he uses his past skills for protection and security. Hacking is not about computers, and soft - that's a mindset about finding hidden things that are repetitive (repetitions). Ahmad succeeded within 4-5 months of being a top US DoD hacker because of his automation process. Then he shaped into start-up that is focused on vulnerability assessment penetration. And remember that all is not about the darknet it's about the internet!
馃 Partner of the episode: Veeam AWS Backup and Recovery - 10 instances for free for listeners: https://vee.am/evoila
(00:01:04) From hacker to the security protector: what's a secret soft, is that automation?
(00:08:16 How can we apply the knowledge and skills taken from hackers to companies as a protection basis?
(00:14:26) Botnet: a cloud of infected computers or sth else?
(00:16:33) For whom such hacker-like services are? The banking sector, governments, big enterprises, and who else?
(00:21:28) Tools used by hackers to target and protect as well
(00:30:42) vCISO (virtual CISO) - is it a good approach to have such a team on the company's board?
00:35:07 Main idea of smart hacker and security guy: look outside your purpose!
馃敂 Subscribe channel: https://bit.ly/sub_evoilutioncast

13 Listeners